american international university school of engineering and computing
Search for question
Question
AMERICAN
INTERNATIONAL
UNIVERSITY
SCHOOL OF ENGINEERING AND COMPUTING
CSC495 - Senior Computer Project
Team Members:
Spring 2024
Deliverable: Progress Report 2
Submission Date: 11/5/2024
-
Yousef Alduwaisan: 201000075
CSC495 - Senior Computer Project | 1 Table of Contents
1.1.
1. Introduction.
Overview
1.2.
Motivation..
1.3.
Problem statement
1.4.
Aim and Objectives
1.5.
1.6.
1.6.1.
Expected Output.
Hardware and Software Requirements.
Hardware Requirements
1.6.2.
Software Requirements.
1.7.
Schedule
2.
Related work........
2.1
Research Article.
2.2
Gaps in the Related Works
2.3
Proposed Approach
3. Requirement Engineering and Analysis.....
Stakeholders
Functional requirements....
3.1.
3.2.
3.3.
Use Case Diagram..........
3.4 Use case description
3.4.1. Test URL..
3.4.2. Feature Extraction.......
3.4.3. Test Input .........
3.5 Non-functional requirements
3.6 constraint
4. Software Architecture & Design.
4.1 Software Architecture......
4.1.2.3 Physical View.......
4.1.3 Logical View..........
4.1.3 Process view.
4.1.4 Component detail.
4.2. Software design
4.2.1 Use case sequence diagram
4.2.1.1 Feature Extraction......
4.2.1.2 URL Input……………………………….
4.2.2 User Interface Prototype.
=References.....
.4
.5
.5
.5
.6
.6
.6
..6
.7
.8
12
.12
.13
.13
13
.13
.14
14
.15
15
.17
17
.17
.17
.18
.18
18
.19
.20
.20
..20
.21
.21
.21
CSC495 - Senior Computer Project | 2 CSC495 - Senior Computer Project | 3 1. Introduction
1.1. Overview
Cross-site scripting (XSS) is a prevalent security vulnerability found in web
applications. It occurs when attackers inject malicious scripts into web pages viewed
by other users. These scripts can execute in the context of a user's browser, potentially
allowing the attacker to steal sensitive information, hijack user sessions, or deface
websites. XSS attacks can be classified into three types: stored XSS, reflected XSS,
and DOM-based XSS, each with its methods of exploitation. Mitigating XSS
vulnerabilities requires input validation, output encoding, implementing a Content
Security Policy (CSP), and adhering to secure development practices. By addressing
XSS threats, organizations can safeguard their web applications and protect users
from malicious exploitation.
Nowadays, artificial intelligence (AI) plays a crucial role in combating XSS attacks
by enabling advanced detection and prevention mechanisms. Al-powered algorithms
can analyze web traffic patterns and user behavior to identify anomalous activities
indicative of XSS attempts. Machine learning models trained on large datasets of
known XSS vulnerabilities can automatically detect and mitigate potential threats in
real time. Natural language processing (NLP) techniques enable Al systems to
understand and interpret input data, aiding in the identification of malicious scripts
embedded within user inputs. Additionally, Al-driven security solutions can adapt and
evolve to counter emerging XSS attack vectors, enhancing the overall resilience of
web applications against exploitation. As XSS attacks become increasingly
sophisticated, the integration of Al into security strategies offers a proactive defense
mechanism to safeguard sensitive data and protect users from potential harm.
CSC495 - Senior Computer Project | 4 1.2. Motivation
XSS has been a rising issue in web application development for a while. It can lead
to security risks for both website owners and users such as unauthorized access, data
theft, and potential harm to users. Addressing XSS is crucial to ensure the integrity
and security of web applications. The developed tool could help users test their URLs
or some other websites to find any potential vulnerability that could lead to this type of
attack which would contribute to the cybersecurity community by enhancing internet
safety.
1.3. Problem statement
To address the issue of XSS, a machine-learning approach to detect XSS features
from a provided URL is proposed. Data will be collected and pre-processed to extract
the needed features. After that, several models will be trained on the extracted data
and tested using evaluation metrics to leverage one model to another. The model with
the highest performance would be integrated into a web application that would allow
the users to test URLs for potential risks.
1.4. Aim and Objectives
This project aims to develop a web application that will take a URL as text input
from the user and will return the prediction of whether this URL may be an XSS attack
or not. To reach this aim, the following objectives have been set:
1. Conducting a related work study.
2. Collecting suitable XSS data. of cross-site scripting.
3. Data pre-processing and feature extraction of the most important features.
4. Training machine learning models on the extracted features.
5. Evaluating the trained model using the suitable evaluation metrics.
6. Developing a web application that utilizes the trained model.
1.5. Expected Output
The expected output of this project would be a security system or tool (web
application) designed to detect and prevent XSS attacks on web applications using
machine learning algorithms.
CSC495 Senior Computer Project |
| 5/n 1- write about the introduction in the first page, divide the overview ( ai, cross site scripting and
combine them) ( one slide)
- motivation and problem statement ( one slide)
- Aim and objective ( one slide)
2- related work :
read them all and summarize it, the model they used and the accuracy of each model and the
conclusion (slide ) make it table and talk about the gaps and proposed approach (one slide)
3- requirements engineering :
Stakeholders with picture and the use-case diagram at the same slide (both one slide)
4-functional requirements:
Put all 8 points (one slide)
5- use description take one schedule test url and about it in details ( one slide)
6- non-functional requirements
Put them as in the word document (one slide )
7 - architecture and design:
Talk about each view ( physical, logical, process ) )explain ( 1 or 2 slides)